Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Law

Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz Dec 2014

Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz

Touro Law Review

No abstract provided.


Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb Dec 2014

Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb

Sherry Colb

No abstract provided.


The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright Nov 2014

The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright

Danaya C. Wright

The U.S. Supreme Court's June 2003 decision in Lawrence v. Texas may prove to be one of the most important civil rights cases of the twenty-first century. It may do for gay and lesbian people what Brown v. Board of Education did for African-Americans and Roe v. Wade did for women. While I certainly hope so, my enthusiasm is tempered by the fact that discrimination on the basis of race or gender has not disappeared. Will Lawrence signal meaningful change, or will its revolutionary possibilities be stifled by endless cycles of excuse and redefinition? The case is important, but I …


Liberty, James E. Fleming, Linda C. Mcclain Oct 2014

Liberty, James E. Fleming, Linda C. Mcclain

Faculty Scholarship

"To secure the blessings of liberty," the Preamble to the US Constitution proclaims, "We the People . . . ordain and establish this Constitution." The Constitution is said to secure liberty through three principal strategies: the design of the Constitution as a whole; structural arrangements, most notably separation of powers andfederalism; and protection of rights. This chapter focuses on this third strategy of protecting liberty, in particular, through the Fifth and Fourteenth Amendments. We first examine the several approaches taken to the "Incorporation" of certain basic liberties "enumerated" in the Bill of Rights to apply to the state governments. We …


Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski Oct 2014

Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski

Faculty Publications

For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …


Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello Jul 2014

Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in a digital device no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan Jun 2014

State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan

Catholic University Law Review

No abstract provided.


Criminal Procedure Decisions In The October 2005 Term, Susan N. Herman Jun 2014

Criminal Procedure Decisions In The October 2005 Term, Susan N. Herman

Touro Law Review

No abstract provided.


United States V. Jones: Big Brother And The "Common Good" Versus The Fourth Amendment And Your Right To Privacy, Melanie Reid Jun 2014

United States V. Jones: Big Brother And The "Common Good" Versus The Fourth Amendment And Your Right To Privacy, Melanie Reid

Tennessee Journal of Law and Policy

In the center of the town of Siena, Italy, lays the Palazzo Publico which was built between 1297 and 1310. Inside the Palazzo Publico is the Sala della Pace, the Hall of Peace, which houses an early piece of Italian secular arta fresco that illustrates the effect government has on the city, its people, and the countryside.' The painter, Ambrogio Lorenzetti, depicted the "Common Good" as a king, sitting tall and strong above a line of smaller-sized, everyday people who are slowly making their way towards the "Common Good." This picture represents the subordination of private interest to the common …


Personal Curtilage: Fourth Amendment Security In Public, Andrew Guthrie Ferguson Apr 2014

Personal Curtilage: Fourth Amendment Security In Public, Andrew Guthrie Ferguson

William & Mary Law Review

Do citizens have any Fourth Amendment protection from senseenhancing surveillance technologies in public? This Article engages a timely question as new surveillance technologies have redefined expectations of privacy in public spaces. It proposes a new theory of Fourth Amendment security based on the ancient theory of curtilage protection for private property. Curtilage has long been understood as a legal fiction that expands the protection of the home beyond the formal structures of the house. Based on custom and law protecting against both nosy neighbors and the government, curtilage was defined by the actions the property owner took to signal a …


Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski Mar 2014

Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski

Touro Law Review

No abstract provided.


It's Reasonable To Expect Privacy When Watching Adult Videos, Matthew Leonhardt Mar 2014

It's Reasonable To Expect Privacy When Watching Adult Videos, Matthew Leonhardt

Touro Law Review

No abstract provided.


Pretrial Detention And The Right To Be Monitored, Samuel R. Wiseman Mar 2014

Pretrial Detention And The Right To Be Monitored, Samuel R. Wiseman

Scholarly Publications

Although detention for dangerousness has received far more attention in recent years, a significant number of non-dangerous but impecunious defendants are jailed to ensure their presence at trial due to continued, widespread reliance on a money bail system. This Essay develops two related claims. First, in the near term, electronic monitoring will present a superior alternative to money bail for addressing flight risk. In contrast to previous proposals for reducing pretrial detention rates, electronic monitoring has the potential to reduce both fugitive rates (by allowing the defendant to be easily located) and government expenditures (by reducing the number of defendants …


Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind Feb 2014

Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind

Tonja Jacobi

It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa Jan 2014

The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa

Pepperdine Law Review

No abstract provided.


In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program , Thomas J. Stipanowich Jan 2014

In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program , Thomas J. Stipanowich

The Journal of Business, Entrepreneurship & the Law

The Delaware Arbitration Program established a procedure by which businesses can agree to have their disputes heard in an arbitration proceeding before a sitting judge of the state’s highly regarded Chancery Court. The Program arguably offers a veritable trifecta of procedural advantages for commercial parties, including expert adjudication, efficient case management and short cycle time and, above all, a proceeding cloaked in secrecy. It also may enhance the reputation of Delaware as the forum of choice for businesses. But the Program’s ambitious intermingling of public and private forums brings into play the longstanding tug-of-war between the traditional view of court …


Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli Jan 2014

Facebook Is Not Your Friend: Protecting A Private Employee's Expectation Of Privacy In Social Networking Content In The Twenty-First Century Workplace, Cara Magatelli

The Journal of Business, Entrepreneurship & the Law

This Comment explores the implications SNS postings have on private employers concerning the off-duty, non-work related conduct of their employees. This argument recognizes that an employee is entitled to engage in whatever legal off-duty conduct he chooses, so long as the behavior does not damage his employer's legitimate business interests. An employer should not be able to use information gleaned from an employee's SNS postings, unrelated to an employer's business interests, to punish an employee for her choices outside the work place. Disciplining or terminating an employee for his off-duty lifestyle choices permits the morals and standards of the employer …


Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean Jan 2014

Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean

Adam Lamparello

The article explores the December 31, 2013 Abidor decision where the federal district court upheld the ongoing application of the border search exception as applied to deep, forensic searches of laptops and other digital devices. That exception allows suspicionless searches of any persons, effects, and “closed containers” crossing a border into the United States, and laptops and external hard drives are generally considered “closed containers” under the border search exception. We argue that the border search exception, grounded as it is in pre-digital age fact patterns, should no longer serve as precedent for border searches of the immense memories of …


Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello Jan 2014

Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello

Adam Lamparello

Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”


Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean Jan 2014

Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean

Charles E. MacLean

The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”

This article calls upon Congress, and to a lesser extent, state legislatures, to control that …


The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr. Jan 2014

The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.

Albert E Poirier Jr.

The years between 1913 and 1967 saw a growing tendency on the part of the Supreme Court to allow the submission of evidence that had been gained unlawfully by the police or prosecutors. Since 1961, and particularly during the Rehnquist and Roberts Courts, the rules excluding evidence have steadily diminished. This paper seeks to review the history of the exclusionary rule.


Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte Jan 2014

Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte

Journal of Business & Technology Law

No abstract provided.


A Corporate Right To Privacy, Elizabeth Pollman Jan 2014

A Corporate Right To Privacy, Elizabeth Pollman

All Faculty Scholarship

The debate over the scope of constitutional protections for corporations has exploded with commentary on recent or pending Supreme Court cases, but scholars have left unexplored some of the hardest questions for the future, and the ones that offer the greatest potential for better understanding the nature of corporate rights. This Article analyzes one of those questions — whether corporations have, or should have, a constitutional right to privacy. First, the Article examines the contours of the question in Supreme Court jurisprudence and provides the first scholarly treatment of the growing body of conflicting law in the lower courts on …


Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player Jan 2014

Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player

All Faculty Scholarship

In Populations, Public Health and the Law, legal scholar Wendy Parmet urges courts to embrace population-based legal analysis, a public health inspired approach to legal reasoning. Parmet contends that population-based legal analysis offers a way to analyze legal issues—not unlike law and economics—as well as a set of values from which to critique contemporary legal discourse. Population-based analysis has been warmly embraced by the health law community as a bold new way of analyzing legal issues. Still, population-based analysis is not without its problems. At times, Parmet claims too much territory for the population perspective. Moreover, Parmet urges courts …


The Trickle-Down War, Rosa Brooks Jan 2014

The Trickle-Down War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …


Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald Dec 2013

Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald

Susan Freiwald

Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …


Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson Dec 2013

Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson

Stephen E Henderson

"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …